Contents
Academic literature on the topic 'Mécanismes – Informatique'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mécanismes – Informatique.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Mécanismes – Informatique"
Lemasson, Jean-Pierre. "Pour une informatique des libertés." Cahiers de recherche sociologique, no. 13 (April 19, 2011): 139–52. http://dx.doi.org/10.7202/1002080ar.
Full textLÉWY, NICOLAS, FRANÇOIS GROSJEAN, LYSIANE GROSJEAN, ISABELLE RACINE, and CAROLE YERSIN. "Un modèle psycholinguistique informatique de la reconnaissance des mots dans la chaîne parlée du français." Journal of French Language Studies 15, no. 1 (March 2005): 25–48. http://dx.doi.org/10.1017/s0959269505001900.
Full textGardey, Delphine. "Mécaniser L'Écriture et Photographier la Parole." Annales. Histoire, Sciences Sociales 54, no. 3 (June 1999): 587–614. http://dx.doi.org/10.3406/ahess.1999.279766.
Full textZerrouk, N. E., and C. Marche. "Une contribution expérimentale à l'étude de l'érosion d'une digue par submersion et son analyse." Revue des sciences de l'eau 18, no. 3 (April 12, 2005): 381–401. http://dx.doi.org/10.7202/705564ar.
Full textGile, Daniel. "La traduction et l’interprétation comme révélateurs des mécanismes de production et de compréhension du discours." Meta 35, no. 1 (September 30, 2002): 20–30. http://dx.doi.org/10.7202/002897ar.
Full textLarocque, M., and O. Banton. "Gestion de la contamination des eaux souterraines par les fertilisants agricoles: application du modèle AgriFlux." Revue des sciences de l'eau 8, no. 1 (April 12, 2005): 3–20. http://dx.doi.org/10.7202/705210ar.
Full textMERSCH, Marjorie, Sarah-Anne DAVID, Anaïs VITORINO CARVALHO, Sylvain FOISSAC, Anne COLLIN, Frédérique PITEL, and Vincent COUSTHAM. "Apports du séquençage haut-débit sur la connaissance de l'épigénome aviaire." INRA Productions Animales 31, no. 4 (January 23, 2019): 325–36. http://dx.doi.org/10.20870/productions-animales.2018.31.4.2372.
Full textRey, Joëlle, and Mercedes Tricás. "Stratégies de traduction : les introductions et les conclusions dans des textes de vulgarisation scientifique." Meta 51, no. 1 (May 29, 2006): 1–19. http://dx.doi.org/10.7202/012871ar.
Full textMiendjiem, Isidore Léopold. "Le Père Noël des créateurs et diffuseurs des oeuvres de l’esprit au Cameroun : La Loi n° 2000/011 du 19 décembre 2000 relative au droit d’auteur et aux droits voisins." Revue générale de droit 32, no. 3 (January 20, 2015): 527–82. http://dx.doi.org/10.7202/1028081ar.
Full textAGABRIEL, J. "Avant-propos." INRAE Productions Animales 20, no. 2 (June 7, 2007): 107–8. http://dx.doi.org/10.20870/productions-animales.2007.20.2.3442.
Full textDissertations / Theses on the topic "Mécanismes – Informatique"
Quétier, Benjamin. "EmuGrid : études de mécanismes de virtualisation pour l'émulation conforme de Grilles à grande échelle." Paris 11, 2008. http://www.theses.fr/2008PA112200.
Full textIn the distributed systems domain, emulation is a significant methodology. It allows to test real applications, observe their behavior, experimentally verify some of their properties and achieving measurements in a controlled environment. However, there is no emulator for the large scale which owns essential characteristics like reproducibility. The main goal of this thesis is to make up an environment to emulate large scale distributed systems (typically 100 000 nodes). The accomplished work has been first to enumerate the different ways for evaluating distributed system at large scale. Then, we have defined expected characteristics for a tool which could emulate many machines while showing essentials characteristics like fairness, reproducibility, etc. This specification is the root of an architecture proposal for the V-DS tool (Virtualization environment for large-scale Distributed Systems). The continuation of this thesis describes implementation choices and the software / middleware selection to realize the emulator. A set of experiments achieved with 10 000 virtual machines on a 250 nodes cluster with bi-processors validates the initially defined properties. The validated emulator has been used to study virtualization impact on parallel applications execution. Experiments have mainly consisted in measuring execution time of MPI (Message Passing Interface) processes by varying the amount of virtual machines per physical node. V-DS has permitted us to test how scale different Distributed Hash Table (DHT) implementations. At last, the emulator is actually being upgraded to allow “data link” network layer emulation
Carmo, Rosa Maria Leão. "Le réseau DQDB : spécification, modélisation et évaluation de performances de mécanismes pour des services temps réel." Toulouse 3, 1994. http://www.theses.fr/1994TOU30243.
Full textGaugain, Claire. "Exploitation bioinformatique des relations entre mécanismes moléculaires et fonctions cellulaires." Bordeaux 2, 2007. http://www.theses.fr/2007BOR21461.
Full textBiological data integration is one of the major challenge in bioinformatics today. The availability of amounts of data concerning all the level of cell organisation, requires strategies of integration to bring together these data and thus better understand how the cell works. We have focused our work on the use of the concept of neighbourhood in order to represent and integrate data. First, our work emphasizes the importance of the choice of data representation for an efficient integration. Our study on metabolism representation shows that elementary modes are a relevant alternative to the classical representation of metabolism as metabolic pathways. Moreover, elementary modes have enabled us to find metabolic routes used by the cell in response to stressed. We have also used the neighbourhood in a new angle, the one of comparative genomics. We tested if expression neighbourhood of genes (set of genes with close expression profiles) can be a signature for genes, and if it can be used to define functional similarities between genes from different organisms. The work presented here, shows the interest of the exploration of gene and protein neighbourhood in order to integrate heterogeneous data. The efficiency of this exploration is highly related to the choice of knowledge representation
Elbaz, Reouven. "Mécanismes matériels pour des transferts processeur mémoire sécurisés dans les systèmes embarqués." Montpellier 2, 2006. http://www.theses.fr/2006MON20119.
Full textArdourel, Gilles. "Modélisation des mécanismes de protection dans les langages à objets." Montpellier 2, 2002. http://www.theses.fr/2002MON20183.
Full textMounyol, Roger. "Poste de programmation pour la commande cinématique des robots manipulateurs." Paris 11, 1989. http://www.theses.fr/1989PA112045.
Full textThe aim of Inverse Kinematic transformation is to define joint motions around a configuration to obtain a desired end-effector trajectory, specified by operational coordinates. In Robotics we are interested in the performance of complex tasks industrial such as welding, assembly, or painting which all need the inverse kinmatic control. We present in this thesis efficient algorithms for solving the Inverse kinematic command used in any robot manipulator. The constraints of real time are harsly treated. The methodologes implemented take in account the position and speed aspects. In case of redundancy, the approach presented here assumed the motion of one link to be prescribed as an input and found the displacement of the rest of the mechanism as they incremented input. In fact this approach specifies an additionnal desirable trajectory which may allow an obstacle avoidance. Our programms are included by RCCL, "Robot Control under C library" which the real time advantages are well known. The singularity problem in relation to the redundancy is also analized
Del, Rio Alberto. "Mécanismes de reconnaissance chirale en chromatographie liquide haute performance : études théoriques et chimio-informatiques." Aix-Marseille 3, 2005. http://www.theses.fr/2005AIX30061.
Full textCombined theoretical and chemoinformatics studies are presented in the field of enantioselective recognition. Several approaches are used such as molecular modeling, DFT calculations, molecular dynamics, QSAR techniques and other data mining procedures. The focus is the establishment of connections between available experimental data and these diverse algorithms based on the mathematical and topological description of chiral molecules. The outcomes of the aforementioned calculations account for a use of these techniques as a core strategy to achieve reliable prediction systems, infer the mechanisms of chiral recognition, generate new lead chiral receptors and assist experimental techniques such as chiral liquid chromatography. Moreover, computational methods promise to have a wide range of applications for both academia and industries, ranging from enantioselective reactions to analytical and semi-preparative separations or large-scale, production of enantiopure compounds
He, Ruan. "Architecture et mécanismes de sécurité pour l'auto-protection des systèmes pervasifs." Paris, Télécom ParisTech, 2010. https://pastel.hal.science/pastel-00579773.
Full textIn this thesis, we propose: - A three-layer abstract architecture: a three-layer self-protection architecture is applied to the framework. A lower execution space provides running environment for applications, a control plane controls the execution space, and an autonomic plane guides the control behavior of the control plane in taking into account system status, context evolution, administrator strategy and user preferences. - An attribute-based access control model: the proposed model (Generic Attribute-Based Access Control) is an attribute-based access control model which improves both the policy-neutrality to specify other access control policies and exibility to enable fine-grain manipulations on one policy. - A policy-based framework for authorization integrating autonomic computing: the policy-based approach has shown its advantages when handling complex and dynamic systems. In integrating autonomic functions into this approach, an Autonomic Security Policy Framework provides a consistent and decentralized solution to administer G-ABAC policies in large-scale distributed pervasive systems. Moreover, the integration of autonomic functions enhances user-friendliness and context-awareness. - A terminal-side access control enforcement OS: the distributed authorization policies are then enforced by an OS level authorization architecture. It is an effcient OS kernel which controls resource access through a dynamic manner to reduce authorization overhead. On the other hand, this dynamic mechanism improves the integrability of di_erent authorization policies. - An adaptation policy specifcation Domain Speci_c Language (DSL) for adaptation policy specification
Araujo, Ribeiro João. "Mécanismes du système d'exploitation pour le support du multimédia." Versailles-St Quentin en Yvelines, 1999. http://www.theses.fr/1999VERS0009.
Full textConstantin, Joseph. "Contrôle-Commande d'un bras robotique planaire par approches neuromimétiques." Amiens, 2001. http://www.theses.fr/2001AMIE0001.
Full text